Last week, CERT of South Korea recognized a exploit in Adobe Flash 28.0.0.137 (and all previous versions of course) which could allow remote code execution in Windows, macOS, Linux and Chrome OS.
Adobe soon after announced in a security bulletin that it would fix it vulnerability in the release scheduled for release this week. ...on time, only that the exploit is released...
Cisco's Talos researchers have stated that the payload that existed in an Excel was ROKRAT and refers to Group 123.
"Group 123 has joined some hacking elites in this latest ROKRAT payload.
They have used a Zero Day of Adobe Flash that was except of their previous capabilities – they've used exploits in previous campaigns but never had a brand new exploit like they've done now,” Talos researchers Warren Mercer and Paul Rascagneres report.
“Though on Talos we don't have any information for victims, we suspect that the victim was a very specific and high-value target. The use of a brand new exploit, which did not exist, shows that they were very determined to succeed in the attack.”
FireEye on the other hand stated that the malicious archive it should come from North Korea, and is known as TEMP.Reaper.
While Adobe suggests that administrators could use Protected View for Office to protect them, FireEye stressed that it is very likely that we will see more attacks until the vulnerability is repaired.
Last July, Adobe announced it would stop supporting Flash on 2020, with Microsoft claiming to completely remove Flash support from Windows in the same year.
- Binary Option Trading: Scam or minimize risks?
- Intel: Finally in BIOS from 2020. An improved UEFI comes in